Executive Summary
A malicious Checkmarx Jenkins AST plugin release was distributed through the Jenkins Marketplace and executed through expected plugin lifecycle behavior, making normal plugin installation a high-trust attack path.
Technical SEO post covering the compromised Checkmarx Jenkins AST plugin release, malicious artifacts, hashes, network IOCs, and the exact versions defenders should investigate or replace.
The structured fields below are intended for technical responders, not just general readers.
A malicious Checkmarx Jenkins AST plugin release was distributed through the Jenkins Marketplace and executed through expected plugin lifecycle behavior, making normal plugin installation a high-trust attack path.
This is a particularly operationally dangerous compromise because it sits inside CI/CD infrastructure where plugins are often trusted implicitly and can access source, credentials, and runner context at scale.
Jenkins controllers, build agents, pipeline secrets, source code, and connected artifact or cloud credentials are in scope.
Mitigated, but compromised artifacts and infrastructure remain high-value retro-hunt indicators.
Verify plugin versions and hashes, review plugin installation provenance, search controller and runner logs for the known domains and artifact names, and rotate secrets used by affected Jenkins jobs.
Agent-authored technical narrative, preserving headings, lists, and code blocks.
This incident abused the normal Jenkins plugin trust path rather than a suspicious sideloading flow. That matters because Jenkins plugins execute inside CI/CD infrastructure that already has access to source code, build secrets, and deployment material.
Jenkins Plugin Manager
checkmarx-ast-scanner:2026.5.09
Known clean replacement coordinates
checkmarx-ast-scanner:2.0.13-848.v76e89de8a_053
checkmarx-ast-scanner:2.0.13-847.v08c0072b_2fd5
Verified.
.hpi, .jar, and .pom artifacts associated with the compromised release.Why this matters: The attack did not need a separate loader path if administrators or automation already trusted the plugin update channel.
Verified with high confidence.
checkmarx.zone, checkmarx.cx, audit.checkmarx.cx, and updates.checkmarx.cx.Why this matters: Analysts can treat the Jenkins plugin incident as part of a broader infrastructure cluster instead of a fully isolated event.
Verified by architecture and source context.
Why this matters: Even short-lived installation or upgrade events can expose high-value secrets if the plugin executes before containment.
checkmarx-ast-scanner release was made available through the expected plugin distribution path.tpcp.tar.gz and setup.sh.The important execution point here is the plugin lifecycle itself. A Jenkins plugin does not need to masquerade as an application dependency post-install; it already lands in a location where Jenkins loads trusted code.
checkmarx-ast-scanner-2026.5.09.hpi
01ff1e56fd59a8fa525d97e670f7f297a1a204331b89b2cd4e36a9abc6419203
checkmarx-ast-scanner-2026.5.09.jar
f50a96d26a5b0beb29de4127e82b2bf350c21511e5a43d286e43f798dc6cd53f
checkmarx-ast-scanner-2026.5.09.pom
3ddb8967919a801b3c383e58cddceab21138134c6a26560d99e2672e86f36f2a
checkmarx.zone
checkmarx.cx
91.195.240.123
audit.checkmarx.cx
94.154.172.43
updates.checkmarx.cx
94.154.172.183
The combination of plugin artifacts plus campaign domains is the strongest way to anchor historical exposure.
rg -n "checkmarx-ast-scanner:2026.5.09|checkmarx.zone|checkmarx.cx|audit.checkmarx.cx|updates.checkmarx.cx|tpcp.tar.gz|setup.sh" /var/lib/jenkins "$WORKSPACE"
Analyst focus:
tpcp.tar.gz or setup.shAffected package coordinates and indicators are grouped once for hunting, detections, and review.
checkmarx-ast-scanner:2026.5.09 audit.checkmarx.cx
checkmarx.cx
checkmarx.zone
updates.checkmarx.cx checkmarx-ast-scanner-2026.5.09.hpi
checkmarx-ast-scanner-2026.5.09.jar
checkmarx-ast-scanner-2026.5.09.pom
setup.sh 91.195.240.123
94.154.172.183
94.154.172.43 01ff1e56fd59a8fa525d97e670f7f297a1a204331b89b2cd4e36a9abc6419203
3ddb8967919a801b3c383e58cddceab21138134c6a26560d99e2672e86f36f2a
f50a96d26a5b0beb29de4127e82b2bf350c21511e5a43d286e43f798dc6cd53f tpcp.tar.gz Detection logic is rendered as code so technical users can lift it directly into their own tooling.
rg -n "checkmarx.zone|checkmarx.cx|audit.checkmarx.cx|updates.checkmarx.cx|tpcp.tar.gz|setup.sh" /var/lib/jenkins "$WORKSPACE" checkmarx-ast-scanner:2026.5.09
checkmarx-ast-scanner:2.0.13-848.v76e89de8a_053
checkmarx-ast-scanner:2.0.13-847.v08c0072b_2fd5 A concise event chronology helps responders anchor first-seen and disclosure timing.
Research tied the malicious Checkmarx Jenkins AST plugin release to the broader TeamPCP campaign.
Responders identified safe replacement plugin versions and elevated the network indicators for retro-hunting.
Primary references are kept visible so analysts can trace the underlying reporting quickly.
Release listing for the affected plugin ID and version history.
Kodem - TeamPCP Checkmarx Jenkins attack May 9, 2026, 1:25 AMIndependent technical writeup connecting the malicious plugin release to the broader TeamPCP campaign.